(Bijon et al., 2013) propose formal approaches to
react based on quantified risk in RBAC systems.
The main goal of the cited works and approaches
is: (i) to enhance trustworthiness relationships in
RBAC systems; or (ii) to define mitigation strategies
based on constraints; or (iii) to manage accesses
based on a quantified risk. According to our
knowledge, no work has been defined to assess the
risk associated to the evolution of the components of
RBAC policies. To fill this gap, our proposal aims to
quantify the risk associated to the evolution of the
policy components. This evaluation is associated to
the detected anomalies of non-compliance that may
characterize the states evolution of RBAC policies.
5 CONCLUSION
This paper proposes a formal risk-awareness
approach for qualifying the states evolution of
RBAC-based policies in terms of risk. The proposal
is a dynamic quantified approach that computes the
risk values and the corresponding risk rating and
thresholds. It incorporates also an automatic
response monitor to quickly react face risky non
compliance anomalies. This allows monitoring the
compliance of RBAC policies based on risk metrics.
Ongoing works address mainly the refinement of the
formalization of the proposal as well as its finer
integration in the verification and validation system.
REFERENCES
Aziz, B., Foley, S. N., Herbert, J., Swart, G., 2006.
Reconfiguring role based access control policies using
risk semantics. In Journal of High Speed Networks.
Baracaldo, N., Joshi, J., 2012. A trust-and-risk aware rbac
framework: tackling insider threat. In: SACMAT 2012,
pp. 167–176, ACM, New York.
Bijon, K. Z., Krishnan, R., Sandhu, R., 2013. A
framework for risk-aware role based access control. In
Communications and Network Security, pp. 462–469.
Bijon, K. Z., Krishnan, R., Sandhu, R., 2012. Risk-aware
RBAC sessions. In Information Systems Security, pp.
59–74, Springer.
Chakraborty, S., Ray, I., 2006. Trustbac: integrating trust
relationships into the rbac model for access control in
open systems. In Proc. of the 11th ACM symposium on
Access control models and technologies, SACMAT '06,
pp. 49-58, USA.
Chen, L., Crampton, J., 2011. Risk-aware role-based
access control. In Proc. of the 7th International
Workshop on Security and Trust Management.
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A.,
Wagner, G.M., Reninger, A.S, 2007. Fuzzy multi-
level security: an experiment on quantified risk-
adaptive access control. In Security and Privacy, pp.
222 –230.
Feng, F., Lin, C., Peng, D., Li, J., 2008. A trust and
context based access control model for distributed
systems. In Proc. of the 10th IEEE International
Conference on High Performance Computing and
Communications, HPCC '08, pp. 629-634, USA.
Jaeger, T., 1999. On the increasing importance of
constraints. In fourth ACM workshop on Role-based
access control, pp. 33–42.
Jaidi, F., Labbene Ayachi, F., 2014. An approach to
formally validate and verify the compliance of low
level access control policies. The 13th International
Symposium on Pervasive Systems, Algorithms, and
Networks (I-SPAN 2014).
Jaidi, F., Labbene Ayachi, F., 2015. A formal system for
detecting anomalies of non-conformity in concrete
RBAC-based policies. International Conference on
Computer Information Systems WCCAIS-2015- ICCIS.
Jaidi, F., Labbene Ayachi, F., 2015. The problem of
integrity in RBAC-based policies within relational
databases: synthesis and problem study. The 9th
International Conference on Ubiquitous Information
Management and Communication ACM IMCOM.
Jaidi, F., Labbene Ayachi, F., 2015. To summarize the
problem of non-conformity in concrete RBAC-based
policies: synthesis, system proposal and future
directives. In NNGT International Journal of
Information Security, vol. 2, pp. 1-12.
Jaidi, F., Labbene Ayachi, F., 2015. A formal approach
based on verification and validation techniques for
enhancing the integrity of concrete role based access
control policies. In 8th International Conference on
Computational Intelligence in Security for Information
Systems, CISIS 2015.
Ma, J., 2012. A formal approach for risk assessment in
RBAC systems.
Journal of Universal Computer
Science, vol. 18, pp. 2432-2451.
Ma, J., Adi, K., Mejri, M., Logrippo, L., 2010. Risk
analysis in access control systems. In Eighth Annual
International Conference on Privacy Security and
Trust (PST), pp. 160-166.
Molloy, I., Dickens, L., Morisset, C., Cheng, P.-C., Lobo,
J., Russo, A., 2012. Risk-based security decisions
under uncertainty. CODASPY ’12.
Ni, Q., Bertino, E., Lobo, J., 2010. Risk-based access
control systems built on fuzzy inferences.
ASIACCS’10, pp. 250-260, USA.
Nissanke, N., Khayat, E. J., 2004. Risk based security
analysis of permissions in rbac. In Proc. of the 2nd
International Workshop on Security in Information
Systems, pp. 332-341, INSTICC Press.
Simon, T. R., Zurko, M. E., 1997. Separation of duty in
role based environments. In Computer Security
Foundations Workshop, pp. 183–194.
ARiskAwarenessApproachforMonitoringtheComplianceofRBAC-basedPolicies
459